Kawasaki, Japan
Kawasaki, Japan

Meiji University is a private university in Tokyo and Kawasaki, founded in 1881 by three lawyers of the Meiji era, Kishimoto Tatsuo, Miyagi Kōzō, and Yashiro Misao. It is one of the largest and most prestigious Japanese universities in Tokyo, Japan.The University has nine faculties with total of around 33,000 students on three campuses in Ochanomizu in Chiyoda, Tokyo; the Izumi neighborhood of Suginami-ku, Tokyo; and the Ikuta neighborhood of Tama-ku, Kawasaki. The university is one of the Japanese Ministry of Education, Culture, Sports, Science and Technology's thirteen "Global 30" Project universities. Wikipedia.


Time filter

Source Type

News Article | May 15, 2017
Site: hosted2.ap.org

Log in, look out: Cyber chaos spreads with workweek's start (AP) — Global cyber chaos was spreading Monday as companies booted up computers at work following the weekend's worldwide "ransomware" cyberattack. The extortion scheme created chaos in 150 countries and could wreak even greater havoc as more malicious variations appear. The initial attack, known as "WannaCry," paralyzed computers running Britain's hospital network, Germany's national railway and scores of other companies and government agencies around the world. As a loose global network of cybersecurity experts fought the ransomware hackers, Chinese state media said 29,372 institutions there had been infected along with hundreds of thousands of devices. The Japan Computer Emergency Response Team Coordination Center, a nonprofit providing support for computer attacks, said 2,000 computers at 600 locations in Japan were reported affected so far. Government agencies said they were unaffected. Companies like Hitachi and Nissan Motor Co. reported problems they said had not seriously affected their business operations. In China, universities and other educational institutions were among the hardest hit, about 15 percent of the internet protocol addresses attacked, according to the official Xinhua News Agency. That may be because schools tend to have old computers and be slow about updates of operating systems and security, said Fang Xingdong, founder of ChinaLabs, an internet strategy think tank. Railway stations, mail delivery, gas stations, hospitals, office buildings, shopping malls and government services also were affected, Xinhua said, citing the Threat Intelligence Center of Qihoo 360, a Chinese internet security services company. Elsewhere in Asia, officials in Japan and South Korea said they believed security updates had helped ward off the worst of the impact. The most public damage in South Korea was to cinema chain CJ CGV Co. It was restoring its advertising servers at dozens of theaters after the attack left the company unable to display trailers of upcoming movies. The attack was disrupting computers that run factories, banks, government agencies and transport systems in scores of countries, including Russia, Ukraine, Brazil, Spain, India and Japan, among others. Russia's Interior Ministry and companies including Spain's Telefonica, FedEx Corp. in the U.S. and French carmaker Renault all reported troubles. Experts were urging organizations and companies to immediately update older Microsoft operating systems, such as Windows XP, with a patch released by Microsoft Corp. to limit vulnerability to a more powerful version of the malware — or to future versions that can't be stopped. Paying the ransom will not ensure any fix, said Eiichi Moriya, a cyber security expert and professor at Meiji University. "You are dealing with a criminal," he said. "It's like after a robber enters your home. You can change the locks but what has happened cannot be undone. If someone kidnaps your child, you may pay your ransom but there is no guarantee your child will return." New variants of the rapidly replicating worm were discovered Sunday and one did not include the so-called kill switch that allowed researchers to interrupt its spread Friday by diverting it to a dead end on the internet. Ryan Kalember, senior vice president at Proofpoint Inc. which helped stop its spread, said the version without a kill switch could spread. It was benign because it contained a flaw that prevented it from taking over computers and demanding ransom to unlock files but other more malicious ones will likely pop up. "We haven't fully dodged this bullet at all until we're patched against the vulnerability itself," Kalember said. The attack held users hostage by freezing their computers, popping up a red screen with the words, "Oops, your files have been encrypted!" and demanding money through online bitcoin payment — $300 at first, rising to $600 before it destroys files hours later. Just one person in an organization who clicked on an infected attachment or bad link, would lead to all computers in a network becoming infected, said Vikram Thakur, technical director of Symantec Security Response. "That's what makes this more troubling than ransomware was a week ago," Thakur said. The attack has hit more than 200,000 victims across the world since Friday and is seen as an "escalating threat," said Rob Wainwright, the head of Europol, Europe's policing agency. "The numbers are still going up," Wainwright said. Microsoft's top lawyer is laying some of the blame at the feet of the U.S. government. Brad Smith criticized U.S. intelligence agencies, including the CIA and National Security Agency, for "stockpiling" software code that can be used by hackers. Cybersecurity experts say the unknown hackers who launched this weekend's "ransomware" attacks used a vulnerability that was exposed in NSA documents leaked online. It was too early to say who was behind the onslaught, which struck 100,000 organizations, and what their motivation was, aside from the obvious demand for money. So far, not many people have paid the ransom demanded by the malware, Europol spokesman Jan Op Gen Oorth told The Associated Press. Researchers who helped prevent the spread of the malware and cybersecurity firms worked around the clock during the weekend to monitor the situation and install a software patch to block the worm from infecting more computers in corporations across the U.S., Europe and Asia. "Right now, just about every IT department has been working all weekend rolling this out," said Dan Wire, spokesman at Fireeye Security. Installing the Microsoft patch is one way to secure computers against the virus. The other is to disable a type of software that connects computers to printers and faxes, which the virus exploits, O'Leary added. Microsoft distributed a patch two months ago that could have forestalled much of the attack, but in many organizations it was likely lost among the blizzard of updates and patches that large corporations and governments strain to manage. AP researcher Yu Bing and news assistant Liu Zheng in Beijing; Youkyung Lee in Seoul and Kelvin Chan in Hong Kong contributed to this report.


News Article | May 15, 2017
Site: hosted2.ap.org

Essential News from The Associated Press A patient takes a nap on her wheelchair as she waits with others at the registration desk at Dharmais Cancer Hospital in Jakarta, Indonesia, Monday, May 15, 2017. Global cyber chaos was spreading Monday as companies booted up computers at work following the weekend's worldwide "ransomware" cyberattack. The extortion scheme created chaos in 150 countries and could wreak even greater havoc as more malicious variations appear. (AP Photo/Dita Alangkara) A patient takes a nap on her wheelchair as she waits with others at the registration desk at Dharmais Cancer Hospital in Jakarta, Indonesia, Monday, May 15, 2017. Global cyber chaos was spreading Monday as companies booted up computers at work following the weekend's worldwide "ransomware" cyberattack. The extortion scheme created chaos in 150 countries and could wreak even greater havoc as more malicious variations appear. (AP Photo/Dita Alangkara) Patients wait at the registration desks at Dharmais Cancer Hospital in Jakarta, Indonesia, Monday, May 15, 2017. Global cyber chaos was spreading Monday as companies booted up computers at work following the weekend's worldwide "ransomware" cyberattack. The extortion scheme created chaos in 150 countries and could wreak even greater havoc as more malicious variations appear. (AP Photo/Dita Alangkara) A screenshot of the warning screen from a purported ransomware attack, as captured by a computer user in Taiwan, is seen on laptop in Beijing, Saturday, May 13, 2017. Dozens of countries were hit with a huge cyberextortion attack Friday that locked up computers and held users' files for ransom at a multitude of hospitals, companies and government agencies. (AP Photo/Mark Schiefelbein) People walk in front of the headquarters building of Hitachi Ltd., center, in Tokyo, Monday, May 15, 2017. The global "ransomware" cyberattack hit computers at 600 locations in Japan, but appeared to cause no major problems as Japanese started their workday Monday even as the attack caused chaos elsewhere. Hitachi spokeswoman said emails were slow or not getting delivered, and files could not be opened. The company believes the problems are related to the ransomware attack, although no ransom appears to have been demanded so far. They were installing software to fix the problems. (AP Photo/Shizuo Kambayashi) FILE - In this May 11, 2017 file photo, the emblem of a Nissan car is seen at its showroom in Tokyo. Japan has fallen victim of a global "ransomware" cyberattack that has created chaos in 150 countries. Nissan Motor Co. confirmed Monday, May 15, 2017, some units had been targeted, but there was no major impact on its business. (AP Photo/Eugene Hoshiko, File) TOKYO (AP) — The worldwide "ransomware" cyberattack wreaked havoc in hospitals, schools and offices across the globe on Monday. Asia reported thousands of new cases but no large-scale breakdowns as workers started the week by booting up their computers. The full extent of the damage from the cyberattack felt in 150 countries was unclear and could worsen if more malicious variations of the online extortion scheme appear. The initial attack, known as "WannaCry," paralyzed computers running Britain's hospital network, Germany's national railway and scores of other companies and government agencies around the world. As a loose global network of cybersecurity experts fought the ransomware, the attack was disrupting computers that run factories, banks, government agencies and transport systems in scores of countries, including Russia, Ukraine, Brazil, Spain, India and Japan, among others. Among those hit were Russia's Interior Ministry and companies including Spain's Telefonica and FedEx Corp. in the U.S. Chinese state media said 29,372 institutions there had been infected along with hundreds of thousands of devices. The Japan Computer Emergency Response Team Coordination Center, a nonprofit group providing support in computer attacks, said 2,000 computers at 600 locations in Japan were reported affected. Companies including Hitachi and Nissan Motor Co. reported problems but said they said had not seriously affected their business operations. Auto manufacturer Renault said one of its plants, which employs 3,500 people in Douai, northern France, wasn't reopening Monday as technicians dealt with the cyberattack's aftermath. The temporary halt in production was a "preventative step," Renault said, giving no details on how badly the plant was affected by the malware. In China, universities and other educational institutions were among the hardest hit, possibly because schools tend to have old computers and be slow to update operating systems and security, said Fang Xingdong, founder of ChinaLabs, an internet strategy think tank. On social media students complained about not being able to access their work, and people in various cities said they hadn't been able to take their driving tests over the weekend because some local traffic police systems were down. Railway stations, mail delivery, gas stations, hospitals, office buildings, shopping malls and government services also were affected, China's Xinhua News Agency said, citing the Threat Intelligence Center of Qihoo 360, a Chinese internet security services company. Elsewhere in Asia, the Indonesian government urged businesses to update computer security after the malware locked patient files on computers in two hospitals in the capital, Jakarta. Patients arriving at Dharmais Cancer Hospital had to wait several hours while staff worked with paper records. Officials in Japan and South Korea said they believed security updates had helped ward off the worst of the impact. But the South Korean cinema chain CJ CGV Co. was restoring advertising servers at dozens of theaters after the attack left the company unable to display trailers of upcoming movies. Experts urged organizations and companies to immediately update older Microsoft operating systems, such as Windows XP, with a patch released by Microsoft Corp. to limit vulnerability to a more powerful version of the malware — or to future versions that can't be stopped. Paying ransom will not ensure any fix, said Eiichi Moriya, a cybersecurity expert and professor at Meiji University. "You are dealing with a criminal," he said. "It's like after a robber enters your home. You can change the locks but what has happened cannot be undone. If someone kidnaps your child, you may pay your ransom but there is no guarantee your child will return." New variants of the rapidly replicating worm were discovered Sunday. One did not include the so-called kill switch that allowed researchers to interrupt the malware's spread Friday by diverting it to a dead end on the internet. Ryan Kalember, senior vice president at Proofpoint Inc. which helped stop its spread, said the version without a kill switch could spread. It was benign because it contained a flaw that prevented it from taking over computers and demanding ransom to unlock files but other more malicious ones will likely pop up. "We haven't fully dodged this bullet at all until we're patched against the vulnerability itself," Kalember said. The attack held users hostage by freezing their computers, popping up a red screen with the words, "Oops, your files have been encrypted!" and demanding money through online bitcoin payment — $300 at first, rising to $600 before it destroys files hours later. Just one click on an infected attachment or bad link would lead to all computers in a network becoming infected, said Vikram Thakur, technical director of Symantec Security Response. "That's what makes this more troubling than ransomware was a week ago," Thakur said. The attack has hit more than 200,000 victims across the world since Friday and is seen as an "escalating threat," said Rob Wainwright, the head of Europol, Europe's policing agency. "The numbers are still going up," Wainwright said. Microsoft's top lawyer is laying some of the blame at the feet of the U.S. government. Brad Smith criticized U.S. intelligence agencies, including the CIA and National Security Agency, for "stockpiling" software code that can be used by hackers. Cybersecurity experts say the unknown hackers who launched this weekend's "ransomware" attacks used a vulnerability that was exposed in NSA documents leaked online. It was too early to say who was behind the onslaught, which struck 100,000 organizations, and what their motivation was, aside from the obvious demand for money. So far, not many people have paid the ransom demanded by the malware, Europol spokesman Jan Op Gen Oorth told The Associated Press. Researchers who helped prevent the spread of the malware and cybersecurity firms worked around the clock over the weekend to monitor the situation and install the software patch. "Right now, just about every IT department has been working all weekend rolling this out," said Dan Wire, spokesman at Fireeye Security. Microsoft distributed the patch two months ago, which could have forestalled much of the attack, but in many organizations it was likely lost among the blizzard of updates and patches that large corporations and governments strain to manage. Watt reported from Beijing. AP researcher Yu Bing and news assistant Liu Zheng in Beijing, John Leicester in Paris, Youkyung Lee in Seoul and Kelvin Chan in Hong Kong contributed to this report. Copyright 2017 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.


News Article | May 8, 2017
Site: www.scientificamerican.com

There is something deeply disconcerting about mirrors. The myriad reflecting surfaces that surround us in our everyday lives help us conduct many necessary tasks, such as applying makeup, shaving, or driving a car. But despite our constant use of mirrors, our nervous systems remain surprisingly ill-equipped to grasp the mechanics of refraction and reflection. Some magic tricks take advantage of such perceptual limitations, and are the origin of phrases such as “it’s all smoke and mirrors,” or “it’s all done with mirrors.” Kokichi Sugihara, a mathematical engineer at Meiji University in Japan, has exploited our poor understanding of mirrors to create new and spectacular varieties of perceptual magic. Our May/June Illusions column features mirror-based illusions by Sugihara and others. Here we provide you with step-by-step instructions to re-create some of Sugihara’s head-scratching mirror illusions with paper, glue and scissors. The garage roof covering the little toy car changes shape when you look at its mirror reflection! In reality, it’s a trick of perspective. Build your own paper model of Sugihara’s ambiguous garage roof using the diagram above (you can print it from this template). Part A is the actual roof, and part B a support structure that will maintain the correct roof angles in the model. Cut around the outlines of A and B. There are three types of inner lines: solid lines depict mountain folds, dashed lines depict valley folds, and dash-dot lines show where to glue A and B together. How can you use a mirror to vanish half an object? To make your own half-disappearing hexagon, follow the diagram above (you can print it from this template). Part A is the upper half of the object, which you will need to fold along the two edges, forming 120-degree angles. Part B, or the lower half of the object, is a flat structure and should not be folded. Glue both parts together matching the “a” and “b” letters. For the strongest effect, tilt the mirror slightly downward.


News Article | May 15, 2017
Site: hosted2.ap.org

(AP) — The worldwide "ransomware" cyberattack wreaked havoc in hospitals, schools and offices across the globe on Monday. Asia reported thousands of new cases but no large-scale breakdowns as workers started the week by booting up their computers. The full extent of the damage from the cyberattack felt in 150 countries was unclear and could worsen if more malicious variations of the online extortion scheme appear. The initial attack, known as "WannaCry," paralyzed computers running Britain's hospital network, Germany's national railway and scores of other companies and government agencies around the world. As a loose global network of cybersecurity experts fought the ransomware, the attack was disrupting computers that run factories, banks, government agencies and transport systems in scores of countries, including Russia, Ukraine, Brazil, Spain, India and Japan, among others. Among those hit were Russia's Interior Ministry and companies including Spain's Telefonica and FedEx Corp. in the U.S. Chinese state media said 29,372 institutions there had been infected along with hundreds of thousands of devices. The Japan Computer Emergency Response Team Coordination Center, a nonprofit group providing support in computer attacks, said 2,000 computers at 600 locations in Japan were reported affected. Companies including Hitachi and Nissan Motor Co. reported problems but said they said had not seriously affected their business operations. Auto manufacturer Renault said one of its plants, which employs 3,500 people in Douai, northern France, wasn't reopening Monday as technicians dealt with the cyberattack's aftermath. The temporary halt in production was a "preventative step," Renault said, giving no details on how badly the plant was affected by the malware. In China, universities and other educational institutions were among the hardest hit, possibly because schools tend to have old computers and be slow to update operating systems and security, said Fang Xingdong, founder of ChinaLabs, an internet strategy think tank. Railway stations, mail delivery, gas stations, hospitals, office buildings, shopping malls and government services also were affected, China's Xinhua News Agency said, citing the Threat Intelligence Center of Qihoo 360, a Chinese internet security services company. Elsewhere in Asia, the Indonesian government urged businesses to update computer security after the malware locked patient files on computers in two hospitals in the capital, Jakarta. Patients arriving at Dharmais Cancer Hospital had to wait several hours while staff worked with paper records. Officials in Japan and South Korea said they believed security updates had helped ward off the worst of the impact. But the South Korean cinema chain CJ CGV Co. was restoring advertising servers at dozens of theaters after the attack left the company unable to display trailers of upcoming movies. Experts urged organizations and companies to immediately update older Microsoft operating systems, such as Windows XP, with a patch released by Microsoft Corp. to limit vulnerability to a more powerful version of the malware — or to future versions that can't be stopped. Paying ransom will not ensure any fix, said Eiichi Moriya, a cybersecurity expert and professor at Meiji University. "You are dealing with a criminal," he said. "It's like after a robber enters your home. You can change the locks but what has happened cannot be undone. If someone kidnaps your child, you may pay your ransom but there is no guarantee your child will return." New variants of the rapidly replicating worm were discovered Sunday. One did not include the so-called kill switch that allowed researchers to interrupt the malware's spread Friday by diverting it to a dead end on the internet. Ryan Kalember, senior vice president at Proofpoint Inc. which helped stop its spread, said the version without a kill switch could spread. It was benign because it contained a flaw that prevented it from taking over computers and demanding ransom to unlock files but other more malicious ones will likely pop up. "We haven't fully dodged this bullet at all until we're patched against the vulnerability itself," Kalember said. The attack held users hostage by freezing their computers, popping up a red screen with the words, "Oops, your files have been encrypted!" and demanding money through online bitcoin payment — $300 at first, rising to $600 before it destroys files hours later. Just one click on an infected attachment or bad link would lead to all computers in a network becoming infected, said Vikram Thakur, technical director of Symantec Security Response. "That's what makes this more troubling than ransomware was a week ago," Thakur said. The attack has hit more than 200,000 victims across the world since Friday and is seen as an "escalating threat," said Rob Wainwright, the head of Europol, Europe's policing agency. "The numbers are still going up," Wainwright said. Microsoft's top lawyer is laying some of the blame at the feet of the U.S. government. Brad Smith criticized U.S. intelligence agencies, including the CIA and National Security Agency, for "stockpiling" software code that can be used by hackers. Cybersecurity experts say the unknown hackers who launched this weekend's "ransomware" attacks used a vulnerability that was exposed in NSA documents leaked online. It was too early to say who was behind the onslaught, which struck 100,000 organizations, and what their motivation was, aside from the obvious demand for money. So far, not many people have paid the ransom demanded by the malware, Europol spokesman Jan Op Gen Oorth told The Associated Press. Researchers who helped prevent the spread of the malware and cybersecurity firms worked around the clock over the weekend to monitor the situation and install the software patch. "Right now, just about every IT department has been working all weekend rolling this out," said Dan Wire, spokesman at Fireeye Security. Microsoft distributed the patch two months ago, which could have forestalled much of the attack, but in many organizations it was likely lost among the blizzard of updates and patches that large corporations and governments strain to manage. Watt reported from Beijing. AP researcher Yu Bing and news assistant Liu Zheng in Beijing, John Leicester in Paris, Youkyung Lee in Seoul and Kelvin Chan in Hong Kong contributed to this report.


An intake duct structure for an internal combustion engine includes an intake duct and an adsorption filter. The intake duct has an extendable-contractible portion, which is extendable and contractible in an axial direction, and the adsorption filter is arranged on the inner wall surface of the extendable-contractible portion. The adsorption filter includes an adsorption sheet. The adsorption sheet includes an adsorbent that adsorbs fuel vapor and a folding structure that is extendable and contractible in the axial direction.


News Article | May 15, 2017
Site: hosted2.ap.org

(AP) — The cyberattack that took computer files hostage around the world appeared to slow on Monday as authorities worked to catch the extortionists behind it — a difficult task that involves searching for digital clues and following the money. Thousands more infections were reported with the start of the workweek, largely in Asia, which had been closed for business when the "ransomware" locked up computers Friday at hospitals, factories, government agencies, banks and other businesses. But the big second-wave outbreak that many feared they would see when users returned to their offices Monday morning and switched their computers back on failed to materialize. Lynne Owens, director-general of Britain's National Crime Agency, said there was no indication of a second surge in the cyberattack but warned, "That doesn't mean there won't be one." Security researchers in the meantime have been disassembling the malicious software, known as WannaCry, in hopes of uncovering clues to who released it. They are doing the same with the "phishing" emails that helped the ransomware embed itself in computers. Investigators also hope to learn more by examining ransom payments made by computer users via bitcoin, the hard-to-trace digital currency often used by criminals. WannaCry paralyzed computers running mostly older versions of Microsoft Windows in some 150 countries. It encrypted users' computer files and displayed a message demanding anywhere from $300 to $600 to release them; failure to pay would leave the data mangled and likely beyond repair. A cybersecurity researcher in Britain managed to slow down its spread by activating the software's "kill switch," but there were fears that the cybercriminals would release even more malicious versions. Steve Grobman of the security company McAfee said forensics experts are looking at how the ransomware was written and how it was run. WannaCry is a sophisticated piece of work, he said, which helps rule out the possibility it was released by mere pranksters or lower-level thieves. As for anonymous bitcoin transactions, he said, it is sometimes possible to follow them until an identifiable person is found. So far, not many people have paid the ransom, said Jan Op Gen Oorth, a spokesman for Europol, the European police agency. Eiichi Moriya, a cybersecurity expert and professor at Japan's Meiji University, warned that paying the ransom would not guarantee a fix. "You are dealing with a criminal," he said. "It's like after a robber enters your home. You can change the locks, but what has happened cannot be undone." Meanwhile, automaker Renault decided not to reopen a 3,500-employee plant in France on Monday as a "preventative step." Lebanon's central bank temporarily suspended electronic transactions as a precaution. In Britain, many hospitals and clinics that are part of the country's national health service were still having computer problems. Patients have had to be turned away because their records were inaccessible. In the U.S., where the effects haven't appeared to be widespread, investigators believe additional companies have been attacked but have not yet come forward to report it, a law enforcement official told The Associated Press. The official was not authorized to speak publicly about the investigation. In China, state media said more than 29,000 institutions there had been infected along with hundreds of thousands of devices. Universities and other schools were among the hardest hit. Railway stations, mail delivery, gas stations, hospitals, office buildings, shopping malls and government services were also said to be affected. In Japan, companies such as Hitachi and Nissan reported problems but said their operations had not been seriously affected. In Indonesia, the ransomware locked patient files on computers in two hospitals in the capital, Jakarta, causing delays. Experts urged organizations and companies to immediately update older Microsoft operating systems, such as Windows XP, with a patch released by the company. Associated Press writers Yuri Kageyama in Tokyo; Louise Watt, Yu Bing and Liu Zheng in Beijing; John Leicester in Paris; Youkyung Lee in Seoul; and Kelvin Chan in Hong Kong contributed to this report.


News Article | May 15, 2017
Site: hosted2.ap.org

'WannaCry' virus spreads to Asia, experts warn of new wave (AP) — The worldwide "ransomware" cyberattack spread to thousands more computers on Monday as people across Asia logged in at work, disrupting businesses, schools, hospitals and daily life. But no new large-scale outbreaks were reported, and British officials said a feared second wave of infections had not materialized. The new infections were largely in Asia, which had been closed for business when the malware first struck. In Britain, whose health service was among the first high-profile targets of the online extortion scheme, Health Secretary Jeremy Hunt said "we have not seen a second wave of attacks." He said "the level of criminal activity is at the lower end of the range that we had anticipated." The malware, known as "WannaCry," paralyzed computers running factories, banks, government agencies and transport systems, hitting 200,000 victims in more than 150 countries. Among those hit were Russia's Interior Ministry and companies including Spain's Telefonica and FedEx Corp. in the U.S. Though the spread of the ransomware slowed Monday, many companies and government agencies were still struggling to recover from the first attack. Carmaker Renault said one of its French plants, which employs 3,500 people, wasn't reopening Monday as a "preventative step." Britain's National Health Service said about a fifth of NHS trusts — the regional bodies that run hospitals and clinics — were hit by the attack on Friday, leading to thousands of canceled appointments and operations. Seven of the 47 affected trusts were still having IT problems Monday. The British government denied allegations that lax cybersecurity in the financially stretched, state-funded health service had helped the attack spread. Prime Minister Theresa May said "warnings were given to hospital trusts" about the Microsoft vulnerability exploited by the attackers. NHS Digital, which oversees U.K. hospital cybersecurity, said it sent alerts about the problem — and a patch to fix it — to health service staff and IT professionals last month. Tim Stevens, a lecturer in global security at King's College London, warned that the incident should be a wakeup call to both the public and private sectors to incorporate security into computer systems from the ground up, rather than as an afterthought. "This thing cannot be brushed under the carpet," he said. "It is so visible and so global. There is going to have to be change at levels where change can be made." In Asia, where Friday's attack occurred after business hours, thousands of new cases were reported on Monday as people came back to work. The Japan Computer Emergency Response Team Coordination Center, a nonprofit group, said 2,000 computers at 600 locations in Japan were affected. Companies including Hitachi and Nissan Motor Co. reported problems but said they had not seriously affected their operations. Chinese state media said 29,372 institutions there had been infected along with hundreds of thousands of devices. Universities and other educational institutions in China were among the hardest hit, possibly because schools tend to have old computers and be slow to update operating systems and security, said Fang Xingdong, founder of ChinaLabs, an internet strategy think tank. On social media, students complained about not being able to access their work, and people in various cities said they hadn't been able to take their driving tests over the weekend because some local traffic police systems were down. Railway stations, mail delivery, gas stations, hospitals, office buildings, shopping malls and government services also were affected, China's Xinhua News Agency said, citing the Threat Intelligence Center of Qihoo 360, an internet security services company. In Indonesia, the malware locked patient files on computers in two hospitals in the capital, Jakarta, causing delays. Experts urged organizations and companies to immediately update older Microsoft operating systems, such as Windows XP, with a patch released by Microsoft Corp. to limit vulnerability to a more powerful version of the malware — or to future versions that can't be stopped. The attack held users hostage by freezing their computers, popping up a red screen with the words, "Oops, your files have been encrypted!" and demanding money through online bitcoin payment — $300 at first, rising to $600 before it destroys files hours later. As cybersecurity firms worked around the clock to monitor the situation and install a software patch, new variants of the rapidly replicating malware were discovered Sunday. One did not include the so-called kill switch that allowed researchers to interrupt the malware's spread Friday by diverting it to a dead end on the internet. Ryan Kalember, senior vice president at Proofpoint Inc., which helped stop its spread, said the version without a kill switch could spread. It was benign because it contained a flaw that prevented it from taking over computers and demanding ransom to unlock files but other more malicious ones will likely pop up. "We haven't fully dodged this bullet at all until we're patched against the vulnerability itself," Kalember said. Microsoft distributed a patch two months ago that protected computers such an attack, but in many organizations it was likely lost among the blizzard of updates and patches that large corporations and governments strain to manage. The president of Microsoft laid some of the blame at the feet of the U.S. government. Brad Smith criticized U.S. intelligence agencies, including the CIA and National Security Agency, for "stockpiling" software code that can be used by hackers. Cybersecurity experts say the unknown hackers who launched the attacks used a vulnerability that was exposed in NSA documents leaked online. Tom Bossert, a homeland security adviser to President Donald Trump, said "criminals" were responsible, not the U.S. government. Bossert said the U.S. hasn't ruled out involvement by a foreign government, but that the recent ransom demands suggest a criminal network. Bossert told ABC's "Good Morning America" that the attack is something that "for right now, we've got under control" in the United States. So far, not many people have paid the ransom demanded by the malware, Europol spokesman Jan Op Gen Oorth told The Associated Press. Eiichi Moriya, a cybersecurity expert and professor at Meiji University, warned that paying the ransom would not guarantee a fix. "You are dealing with a criminal," he said. "It's like after a robber enters your home. You can change the locks but what has happened cannot be undone." Yuri Kageyama in Tokyo, Louise Watt, Yu Bing and Liu Zheng in Beijing, John Leicester in Paris, Youkyung Lee in Seoul and Kelvin Chan in Hong Kong contributed to this report.


Patent
Gunze Ltd, Meiji University and Kanagawa Academy Of Science And Technology | Date: 2016-06-15

The present invention aims to provide a bone regeneration material kit, a paste-like bone regeneration material, a bone regeneration material, and a bone bonding material, which contain particles including a bioabsorbable polymer; and can fill a bone defect or damage and secure the mechanical strength of the bone in the short term and can promote regeneration of the patients own bone in the long term. In addition, they can exhibit anti-washout properties after filling even when they are in contact with water such as blood or biological fluids. The present invention relates to a bone regeneration material kit comprising: a particle comprising a calcium salt and having an inositol phosphate or salt thereof adsorbed on the surface; a particle comprising a bioabsorbable polymer; and an aqueous medium.


Patent
GUNZE Ltd, Meiji University and Kanagawa Academy Of Science And Technology | Date: 2014-08-08

The present invention aims to provide a bone regeneration material kit, a paste-like bone regeneration material, a bone regeneration material, and a bone bonding material, which contain particles including a bioabsorbable polymer; and can fill a bone defect or damage and secure the mechanical strength of the bone in the short term and can promote regeneration of the patient s own bone in the long term. In addition, they can exhibit anti-washout properties after filling even when they are in contact with water such as blood or biological fluids. The present invention relates to a bone regeneration material kit comprising: a particle comprising a calcium salt and having an inositol phosphate or salt thereof adsorbed on the surface; a particle comprising a bioabsorbable polymer; and an aqueous medium.


Patent
Meiji University | Date: 2014-05-23

A detecting device (1) detects a combustion state of an internal combustion engine (2) that transmits power via a crankshaft (11). The detecting device (1) includes a calculation unit (1b) that calculates a mass burn fraction by detecting a crank angle, on the basis of a frequency component showing a state change amount of a state change of a detection target according to a change in a cylinder pressure depending on a combustion cycle of the engine (2), and including a harmonic wave component of a fundamental wave of the frequency component.

Loading Meiji University collaborators
Loading Meiji University collaborators